Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2016-1000232


NodeJS Tough-Cookie version 2.2.2 contains a Regular Expression Parsing vulnerability in HTTP request Cookie Header parsing that can result in Denial of Service. This attack appear to be exploitable via Custom HTTP header passed by client. This vulnerability appears to have been fixed in 2.3.0.


Published

2018-09-05T17:29:00.373

Last Modified

2024-11-21T02:43:01.457

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 5.3 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application salesforce tough-cookie ≤ 2.2.2 Yes
Application ibm api_connect ≤ 5.0.6.5 Yes
Application ibm api_connect ≤ 5.0.7.2 Yes
Application ibm api_connect 5.0.8.0 Yes
Application redhat openshift_container_platform 3.1 Yes
Application redhat openshift_container_platform 3.2 Yes
Application redhat openshift_container_platform 3.3 Yes

References